Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:129405
[Eng]
Version
9
Class
patch
ALTXid
321464
Language
Russian
Severity
Critical
Title
Обновление ELSA-2020-1016 : устранение уязвимостей, ошибок и различные доработки в kernel
Description
Multiple security fixes in Oracle Linux.
Family
unix
Platform
Oracle Linux 7
Product
kernel
Reference
VENDOR: ELSA-2020-1016
VENDOR: ELSA-2020-1016
Id:
ELSA-2020-1016
Reference:
http://linux.oracle.com/errata/ELSA-2020-1016.html
CVE: CVE-2018-19985
CVE: CVE-2018-19985
Id:
CVE-2018-19985
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985
Comment
: The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.6
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
125 (Out-of-bounds Read)
References:
https://seclists.org/bugtraq/2019/Jan/52 (MISC)
https://hexhive.epfl.ch/projects/perifuzz/ (MISC)
http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html (MISC)
http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html (MISC)
[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update (MLIST)
[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update (MLIST)
https://security.netapp.com/advisory/ntap-20190404-0002/ (CONFIRM)
[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update (MLIST)
USN-4115-1 (UBUNTU)
USN-4118-1 (UBUNTU)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
CVE: CVE-2019-9503
CVE: CVE-2019-9503
Id:
CVE-2019-9503
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
Comment
: The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVSSv2 Score:
7.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://kb.cert.org/vuls/id/166939/ (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f (MISC)
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=1701842 (MISC)
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9503.html (MISC)
https://security-tracker.debian.org/tracker/CVE-2019-9503 (MISC)
https://bugzilla.suse.com/show_bug.cgi?id=1132828 (MISC)
CVE: CVE-2019-10638
CVE: CVE-2019-10638
Id:
CVE-2019-10638
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
Comment
: In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
6.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE:
326 (Inadequate Encryption Strength)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 (MISC)
https://github.com/torvalds/linux/commit/55f0fc7a02de8f12757f4937143d8d5091b2e40b (MISC)
https://arxiv.org/pdf/1906.10478.pdf (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92 (MISC)
https://github.com/torvalds/linux/commit/df453700e8d81b1bdafdf684365ee2b9431fb702 (MISC)
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df453700e8d81b1bdafdf684365ee2b9431fb702 (MISC)
109092 (BID)
openSUSE-SU-2019:1716 (SUSE)
openSUSE-SU-2019:1757 (SUSE)
https://security.netapp.com/advisory/ntap-20190806-0001/ (CONFIRM)
DSA-4495 (DEBIAN)
20190812 [SECURITY] [DSA 4495-1] linux security update (BUGTRAQ)
DSA-4497 (DEBIAN)
20190813 [SECURITY] [DSA 4497-1] linux security update (BUGTRAQ)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update (MLIST)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update (MLIST)
USN-4114-1 (UBUNTU)
USN-4117-1 (UBUNTU)
USN-4116-1 (UBUNTU)
USN-4115-1 (UBUNTU)
USN-4118-1 (UBUNTU)
RHSA-2019:3309 (REDHAT)
RHSA-2019:3517 (REDHAT)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
CVE: CVE-2019-13648
CVE: CVE-2019-13648
Id:
CVE-2019-13648
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648
Comment
: In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
399 (Resource Management Errors)
References:
https://patchwork.ozlabs.org/patch/1133904/ (MISC)
[oss-security] 20190730 CVE-2019-13648: Linux kernel: powerpc: kernel crash in TM handling triggerable by any local user (MLIST)
https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe (CONFIRM)
https://security.netapp.com/advisory/ntap-20190806-0001/ (CONFIRM)
DSA-4495 (DEBIAN)
20190812 [SECURITY] [DSA 4495-1] linux security update (BUGTRAQ)
DSA-4497 (DEBIAN)
20190813 [SECURITY] [DSA 4497-1] linux security update (BUGTRAQ)
20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01) (BUGTRAQ)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update (MLIST)
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
openSUSE-SU-2019:1923 (SUSE)
openSUSE-SU-2019:1924 (SUSE)
USN-4114-1 (UBUNTU)
USN-4116-1 (UBUNTU)
USN-4115-1 (UBUNTU)
FEDORA-2019-7aecfe1c4b ()
CVE: CVE-2019-10639
CVE: CVE-2019-10639
Id:
CVE-2019-10639
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639
Comment
: The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
326 (Inadequate Encryption Strength)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 (MISC)
https://arxiv.org/pdf/1906.10478.pdf (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92 (MISC)
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 (MISC)
openSUSE-SU-2019:1716 (SUSE)
openSUSE-SU-2019:1757 (SUSE)
[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update (MLIST)
https://security.netapp.com/advisory/ntap-20190806-0001/ (CONFIRM)
DSA-4497 (DEBIAN)
20190813 [SECURITY] [DSA 4497-1] linux security update (BUGTRAQ)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update (MLIST)
https://support.f5.com/csp/article/K32804955 (CONFIRM)
USN-4115-1 (UBUNTU)
USN-4118-1 (UBUNTU)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
https://support.f5.com/csp/article/K32804955?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2019-18660
CVE: CVE-2019-18660
Id:
CVE-2019-18660
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660
Comment
: The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.openwall.com/lists/oss-security/2019/11/27/1 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad (MISC)
[oss-security] 20191128 CVE-2019-18660: Linux kernel: powerpc: missing Spectre-RSB mitigation (MLIST)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1 (CONFIRM)
openSUSE-SU-2019:2675 (SUSE)
https://security.netapp.com/advisory/ntap-20200103-0001/ (CONFIRM)
USN-4228-1 (UBUNTU)
USN-4227-1 (UBUNTU)
USN-4226-1 (UBUNTU)
USN-4225-1 (UBUNTU)
USN-4228-2 (UBUNTU)
USN-4227-2 (UBUNTU)
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
RHSA-2020:0174 (REDHAT)
USN-4225-2 (UBUNTU)
FEDORA-2019-b86a7bdba0 ()
FEDORA-2019-124a241044 ()
CVE: CVE-2019-15916
CVE: CVE-2019-15916
Id:
CVE-2019-15916
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
Comment
: An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
401 (Improper Release of Memory Before Removing Last Reference ('Memory Leak'))
References:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1 (MISC)
https://security.netapp.com/advisory/ntap-20191004-0001/ (CONFIRM)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
openSUSE-SU-2019:2675 (SUSE)
RHSA-2020:0740 (REDHAT)
https://support.f5.com/csp/article/K57418558?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2017-17807
CVE: CVE-2017-17807
Id:
CVE-2017-17807
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
Comment
: The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE:
862 (Missing Authorization)
References:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6 (CONFIRM)
https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b (CONFIRM)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b (CONFIRM)
DSA-4073 (DEBIAN)
102301 (BID)
DSA-4082 (DEBIAN)
[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update (MLIST)
USN-3617-2 (UBUNTU)
USN-3617-1 (UBUNTU)
USN-3620-2 (UBUNTU)
USN-3620-1 (UBUNTU)
USN-3619-1 (UBUNTU)
USN-3617-3 (UBUNTU)
USN-3619-2 (UBUNTU)
USN-3632-1 (UBUNTU)
CVE: CVE-2018-7191
CVE: CVE-2018-7191
Id:
CVE-2018-7191
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191
Comment
: In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9 (MISC)
https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c25f65fd1e42685f7ccd80e0621829c105785d9 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ad646c81b2182f7fa67ec0c8c825e0ee165696d (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.14 (MISC)
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1748846 (MISC)
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1743792 (MISC)
108380 (BID)
openSUSE-SU-2019:1479 (SUSE)
openSUSE-SU-2019:1570 (SUSE)
openSUSE-SU-2019:1579 (SUSE)
CVE: CVE-2015-9289
CVE: CVE-2015-9289
Id:
CVE-2015-9289
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289
Comment
: In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
125 (Out-of-bounds Read)
References:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fa2337a315a2448c5434f41e00d56b01a22283c (MISC)
https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c (MISC)
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.4 (MISC)
CVE: CVE-2019-10207
CVE: CVE-2019-10207
Id:
CVE-2019-10207
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207
Comment
: A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207 (CONFIRM)
https://security.netapp.com/advisory/ntap-20200103-0001/ (CONFIRM)
CVE: CVE-2019-11190
CVE: CVE-2019-11190
Id:
CVE-2019-11190
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190
Comment
: The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://www.openwall.com/lists/oss-security/2019/04/03/4/1 (MISC)
https://www.openwall.com/lists/oss-security/2019/04/03/4 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d (MISC)
107890 (BID)
[oss-security] 20190415 Re: Linux kernel < 4.8 local generic ASLR - CVE-ID (MLIST)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update (MLIST)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update (MLIST)
USN-4008-1 (UBUNTU)
USN-4008-2 (UBUNTU)
USN-4008-3 (UBUNTU)
openSUSE-SU-2019:1570 (SUSE)
CVE: CVE-2019-13233
CVE: CVE-2019-13233
Id:
CVE-2019-13233
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233
Comment
: In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
CVSSv2 Score:
4.4
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1879 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de9f869616dd95e95c00bdd6b0fcd3421e8a4323 (MISC)
https://github.com/torvalds/linux/commit/de9f869616dd95e95c00bdd6b0fcd3421e8a4323 (MISC)
openSUSE-SU-2019:1757 (SUSE)
https://security.netapp.com/advisory/ntap-20190806-0001/ (CONFIRM)
DSA-4495 (DEBIAN)
20190812 [SECURITY] [DSA 4495-1] linux security update (BUGTRAQ)
USN-4094-1 (UBUNTU)
USN-4093-1 (UBUNTU)
USN-4117-1 (UBUNTU)
USN-4118-1 (UBUNTU)
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html (MISC)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
https://support.f5.com/csp/article/K13331647?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2018-20169
CVE: CVE-2018-20169
Id:
CVE-2018-20169
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169
Comment
: An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSSv3 Score:
6.8
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
400 (Uncontrolled Resource Consumption ('Resource Exhaustion'))
References:
https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf (MISC)
USN-3879-2 (UBUNTU)
USN-3879-1 (UBUNTU)
[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update (MLIST)
[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update (MLIST)
[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update (MLIST)
USN-4094-1 (UBUNTU)
USN-4118-1 (UBUNTU)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
CVE: CVE-2019-3901
CVE: CVE-2019-3901
Id:
CVE-2019-3901
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901
Comment
: A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
CVSSv2 Score:
1.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
667 (Improper Locking)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3901 (CONFIRM)
89937 (BID)
https://security.netapp.com/advisory/ntap-20190517-0005/ (CONFIRM)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update (MLIST)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update (MLIST)
CVE: CVE-2019-16746
CVE: CVE-2019-16746
Id:
CVE-2019-16746
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746
Comment
: An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
https://marc.info/?l=linux-wireless&m=156901391225058&w=2 (MISC)
https://security.netapp.com/advisory/ntap-20191031-0005/ (CONFIRM)
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) (BUGTRAQ)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
USN-4186-1 (UBUNTU)
USN-4183-1 (UBUNTU)
USN-4210-1 (UBUNTU)
USN-4209-1 (UBUNTU)
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update (MLIST)
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update (MLIST)
openSUSE-SU-2020:0336 (SUSE)
openSUSE-SU-2020:1153 (SUSE)
https://www.oracle.com/security-alerts/cpuApr2021.html (MISC)
FEDORA-2019-057d691fd4 ()
CVE: CVE-2019-11884
CVE: CVE-2019-11884
Id:
CVE-2019-11884
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
Comment
: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References:
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.15 (MISC)
108299 (BID)
openSUSE-SU-2019:1404 (SUSE)
openSUSE-SU-2019:1407 (SUSE)
openSUSE-SU-2019:1479 (SUSE)
DSA-4465 (DEBIAN)
[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update (MLIST)
[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update (MLIST)
20190618 [SECURITY] [DSA 4465-1] linux security update (BUGTRAQ)
USN-4068-1 (UBUNTU)
USN-4068-2 (UBUNTU)
USN-4069-1 (UBUNTU)
USN-4076-1 (UBUNTU)
USN-4069-2 (UBUNTU)
USN-4118-1 (UBUNTU)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
RHSA-2020:0740 (REDHAT)
FEDORA-2019-640f8d8dd1 ()
FEDORA-2019-e6bf55e821 ()
FEDORA-2019-c36afa818c ()
CVE: CVE-2019-14283
CVE: CVE-2019-14283
Id:
CVE-2019-14283
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283
Comment
: In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
6.8
Attack vector:
PHYSICAL
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 (MISC)
https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6 (MISC)
DSA-4495 (DEBIAN)
20190812 [SECURITY] [DSA 4495-1] linux security update (BUGTRAQ)
DSA-4497 (DEBIAN)
20190813 [SECURITY] [DSA 4497-1] linux security update (BUGTRAQ)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update (MLIST)
20190814 [slackware-security] Slackware 14.2 kernel (SSA:2019-226-01) (BUGTRAQ)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update (MLIST)
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html (MISC)
openSUSE-SU-2019:1923 (SUSE)
openSUSE-SU-2019:1924 (SUSE)
USN-4114-1 (UBUNTU)
USN-4117-1 (UBUNTU)
USN-4116-1 (UBUNTU)
USN-4115-1 (UBUNTU)
USN-4118-1 (UBUNTU)
https://security.netapp.com/advisory/ntap-20190905-0002/ (CONFIRM)
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html (MISC)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html (MISC)
CVE: CVE-2019-12382
CVE: CVE-2019-12382
Id:
CVE-2019-12382
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382
Comment
: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://lkml.org/lkml/2019/5/24/843 (MISC)
https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f (MISC)
108474 (BID)
openSUSE-SU-2019:1570 (SUSE)
openSUSE-SU-2019:1571 (SUSE)
openSUSE-SU-2019:1579 (SUSE)
https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382 (MISC)
FEDORA-2019-7ec378191e ()
FEDORA-2019-f40bd7826f ()
https://lore.kernel.org/lkml/87o93u7d3s.fsf%40intel.com/ ()
Content available only for registered users!
ovaldb@altx-soft.com